Show filters
414 Total Results
Displaying 51-60 of 414
Sort by:
Attacker Value
Unknown
CVE-2021-3607
Disclosure Date: February 24, 2022 (last updated November 08, 2023)
An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-3947
Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.
0
Attacker Value
Unknown
CVE-2021-3930
Disclosure Date: February 18, 2022 (last updated October 07, 2023)
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
0
Attacker Value
Unknown
CVE-2021-4145
Disclosure Date: January 25, 2022 (last updated October 07, 2023)
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
0
Attacker Value
Unknown
CVE-2021-3713
Disclosure Date: August 25, 2021 (last updated February 23, 2025)
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
0
Attacker Value
Unknown
CVE-2021-3682
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
0
Attacker Value
Unknown
CVE-2020-27661
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2019-12067
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
0
Attacker Value
Unknown
CVE-2020-35503
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-3545
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
0